General

  • Target

    446972de8fce92966b4fdda15d5f639a_cryptolocker_JC.exe

  • Size

    70KB

  • MD5

    446972de8fce92966b4fdda15d5f639a

  • SHA1

    94d592bf71ed9d73b0c84f9487fb4bf8007c75bc

  • SHA256

    597becc1912a0d635199afefc87d6636a5fbb777742bbbcb3177319c1b374dc9

  • SHA512

    8836d05ad617f10bd3cd6df1157ba2a9e660d290b56bd3000cc58979c8e0e5a7ada946feae1f34e3c610480081dba1e55a832870451eaca17909a5ab50734c25

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOA+B:T6a+rdOOtEvwDpjNv

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 446972de8fce92966b4fdda15d5f639a_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections